Malicious PyPi packages found with AWS keys

Share post:

Tom Forbes, a UK-based software developer, discovered 57 active API access keys for AWS services that can be exploited. They use keyloggers to steal sensitive user information stored in browsers, run shell commands, and steal typed secrets.

Forbes created a Rust tool that checks the presence of AWS API keys in all new PyPI packages. He then explains that his scanner uses GitHub Actions to look for AWS keys in new PyPI, HexPM, and RubyGems releases. If any are discovered, it generates a report with the relevant information, which is then committed to the aws-cred-scanner repo.

“This report contains the keys that have been found, as well as a public link to the keys and other metadata about the release,” Forbes said in his post. “Because these keys are committed to a public GitHub repository, Github’s Secret Scanning service kicks in and notifies AWS that the keys are leaked.”

As a result, AWS creates a service request to inform the offending developer and implements a quarantine policy to limit the possibility of key misuse. A less vigilant individual could perhaps develop an identical scanning script for misuse and exploitation.

According to Forbes, these AWS keys can be used to steal sensitive user data stored in browsers, run shell commands, and steal typed secrets.

The sources for this piece include an article in TheRegister.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Google Play introduces new biometric verification with a user warning

Google has recently announced updates to the biometric verification process for Google Play purchases, aiming to bolster security...

Cyber Security Today, Week in Review for week ending Friday April 19, 2024

On this episode Jen Ellis, co-chair of the Ransomware Task Force, talks about ways of fighting one of the biggest cyber threats to IT d

Cyber Security Today, April 19, 2024 – Police bust phishing rental platform, a nine-year old virus found on Ukrainian computers, and more

This episode reports on a threat actor targeting governments in the Middle East with a novel way of hiding malware is going international

Controversial expansion of US surveillance powers nears Senate vote

The US Senate is poised to vote on a significant expansion of Section 702 of the Foreign Intelligence...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways